Author of the publication

Automist - A Tool for Automated Instruction Set Characterization of Embedded Processors.

, , , and . Power-aware Computing Systems, volume 07041 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Energy Estimation Based on Hierarchical Bus Models for Power-Aware Smart Cards., , , , , and . DATE, page 300-305. IEEE Computer Society, (2004)Automatic Testbench Generation for Simulation-based Verification of Safety-critical Systems in UML., , , , , and . PECCS, page 70-75. SciTePress, (2016)Power consumption profile analysis for security attack simulation in smart cards at high abstraction level., , , , , and . EMSOFT, page 214-217. ACM, (2005)Horizontal and vertical HW/SW co-design flows for power aware smart card designs., , , , and . IJES, 3 (1/2): 93-106 (2007)A HW/SW Codesign Framework Based on Distributed DSP Virtual Machines., , , and . DSD, page 212-219. IEEE Computer Society, (2001)Case study on multiple fault dependability and security evaluations., , , , , , , and . Microprocessors and Microsystems - Embedded Hardware Design, 37 (2): 218-227 (2013)Fault insertion testing of a novel CPLD-based fail-safe system., , , and . DATE, page 214-219. IEEE, (2009)System side-channel leakage emulation for HW/SW security coverification of MPSoCs., , , , , and . DDECS, page 139-144. IEEE, (2012)A defensive Java Card virtual machine to thwart fault attacks by microarchitectural support., , , , and . CRiSIS, page 1-8. IEEE Computer Society, (2013)A Generic Timing Mechanism for Using the APPLES Gate-Level Simulator in a Mixed-Level Simulation Environment., , and . PATMOS, volume 3254 of Lecture Notes in Computer Science, page 799-808. Springer, (2004)